SC is the International Conference for
 High Performnance Computing, Networking, Storage and Analysis

SCHEDULE: NOV 13-19, 2010

Optimizing Network Performance and Securing Data Intensive Networks with DPI-Enabled Solutions

SESSION: Optimizing Network Performance and Securing Data Intensive Networks with DPI-Enabled Solutions

EVENT TYPE: Birds of a Feather

TIME: 12:15PM - 1:15PM

SESSION LEADER(S):Joel Ebrahimi, Adan Machuca


Alongside the unprecedented scientific and commercial challenges data-intensive computing has enabled organizations to overcome, it has also exposed networks to a host of fast-evolving cyber threats, including hackers, unauthorized access and viruses. As these sophisticated cyber attacks increase in frequency (and ingenuity), network administrators face the unenviable challenge of deploying secure, reliable and flexible solutions to combat malicious activity without compromising network performance. Much like transportation managers responsible for our physical infrastructure, network managers must repair and modernize their organization’s technological infrastructure. Updating legacy systems — often made up of obsolete, slow hardware — can be costly and time consuming, though. They are hard to maintain, improve, or even expand with new applications and devices — challenges made all the more acute because of staffing and budget constraints. Deep packet inspection (DPI)-enabled applications deployed on a DPI-enabled networking solution can neatly address present and future networking security and performance concerns. Whereas traditional network security measures, such as First Generation Firewalls, fail to address sophisticated cyber threats or those originating from within network walls, DPI-enabled applications allow for granular levels of data inspection at near-wire speed to ensure secure data intensive sharing and communication across high-volume networks. Whether open source or government/commercial-of-the-shelf (GOTS/COTS), DPI-enabled network solutions can provide a standard type of format for managing threats. Additionally, since DPI-enabled applications are flexible and scalable, integrating new network applications, devices, and protocols can be achieved in a cost effective manner. This discussion will allow participants to explore best practices for deploying DPI-enabled networking solutions to address new and existing network threats and vulnerabilities in the most demanding network environments. Participants will have the opportunity to discuss the value of open source DPI-enabled applications as they relate to network security, traffic analysis and management solutions in research, government and commercial organizations.

Session Leader Details:

Joel Ebrahimi (Primary Session Leader) - Bivio Networks

Adan Machuca (Secondary Session Leader) - General Dynamics Advanced Information Systems

Add to iCal  Click here to download .ics calendar file

Add to Outlook  Click here to download .vcs calendar file

Add to Google Calendarss  Click here to add event to your Google Calendar

   Sponsors    IEEE    ACM